Chapter 6: Types of Utility Programs and Operating Systems MULTIPLE CHOICE 1. Which of the following is not an operating system function? a. starting the computer c. word processing b. managing programs d. establishing an Internet connection ANS: C
PTS: 1
REF: 271
2. A ____ boot is the process of using the operating system to restart a computer. a. warm c. start b. cold d. new ANS: A
PTS: 1
REF: 272
3. As shown in the accompanying figure, to perform a warm boot, click the ____ command in the Shut down button menu. a. Stand By c. Restart b. Turn Off d. Cancel ANS: C
PTS: 1
REF: 272
4. A ____ interface controls how you enter data and instructions and how information is displayed on the screen. a. control c. user b. utility d. management ANS: C
PTS: 1
REF: 272
5. In a ____, the user types commands or presses special keys on the keyboard to enter data and instructions. a. command-line interface c. performance-monitor interface b. menu-driven interface d. graphical user interface (GUI) ANS: A
PTS: 1
REF: 273
6. With a ____, users interact with menus and visual images such as buttons and other graphical objects to issue commands. a. command-line interface c. performance-monitor interface b. menu-driven interface d. graphical user interface (GUI) ANS: D
PTS: 1
REF: 273
7. The purpose of memory ____ is to optimize the use of RAM. a. performance c. throttling b. management d. integration ANS: B
PTS: 1
REF: 275
8. A(n) ____ is an operation the processor manages. a. buffer c. task b. spool d. event ANS: C
PTS: 1
REF: 275
9. As illustrated in the accompanying figure, the process called ____ sends print jobs to a buffer instead of sending them immediately to the printer. a. paging c. swapping b. spooling d. waiting ANS: B
PTS: 1
REF: 275
10. Multiple print jobs line up in a ____ within a buffer as shown in the accompanying figure. a. queue c. page b. row d. virtual page ANS: A
PTS: 1
REF: 276
11. ____ means the operating system automatically configures new devices as you install them. a. Virtual memory c. Page logging b. Operational buffering d. Plug and Play ANS: D
PTS: 1
REF: 276
12. A(n) ____ OS is an operating system that organizes and coordinates how multiple users access and share resources on a network. a. client c. integrated b. multitasking d. server ANS: D
PTS: 1
REF: 277
13. A network ____, the person overseeing network operations, uses the server operating system to add and remove users, computers, and other devices to and from the network. a. administrator c. client b. owner d. master ANS: A
PTS: 1
REF: 278
14. A ____ is a unique combination of characters, such as letters of the alphabet or numbers, that identifies one specific user. a. user name c. client b. password d. cycle ANS: A
PTS: 1
REF: 278
15. A performance ____ is a program that assesses and reports information about various computer resources and devices. a. monitor c. reporter b. manager d. roster ANS: A
PTS: 1
REF: 277
16. A ____ is a private combination of characters associated with the user name that allows access to certain computer resources. a. folder c. user name b. password d. cipher ANS: B
PTS: 1
REF: 278
17. Which of the following is not a utility function like the ones shown in the accompanying figure? a. managing files c. controlling the keyboard b. viewing images d. uninstalling programs ANS: C
PTS: 1
REF: 277
18. The accompanying figure lists a few of the utilities available in Windows 7; one of the utilities available in Windows 7, a(n) ____, is a utility that allows users to display, copy, and print the contents of a graphics file. a. video card c. scanner b. video driver d. image viewer ANS: D
PTS: 1
REF: 285
19. The accompanying figure lists a few of the utilities available in Windows 7; one of the utilities available in Windows 7, a file ____, is a utility that performs functions related to file management. a. monitor c. scanner b. manager d. controller ANS: B
PTS: 1
REF: 285
20. The accompanying figure lists a few of the utilities available in Windows 7; one of the utilities available in Windows 7, a(n) ____, is a utility that removes a program, as well as any associated entries in the system files. a. application remover c. uninstaller
b. application purger ANS: C
PTS: 1
d. antiapp utility REF: 285
21. The accompanying figure lists a few of the utilities available in Windows 7; one of the utilities available in Windows 7, a disk ____ utility searches for and removes unnecessary files. a. diagnostic c. operator b. uninstaller d. cleanup ANS: D
PTS: 1
REF: 286
22. The accompanying figure lists a few of the utilities available in Windows 7; one of the utilities available in Windows 7, a screen ____, is a utility that causes a display device’s screen to show a moving image or blank screen if no keyboard or mouse activity occurs for a specified time. a. manager c. utility b. saver d. protector ANS: B
PTS: 1
REF: 287
23. The accompanying figure lists a few of the utilities available in Windows 7; one of the utilities available in Windows 7, a personal ____, is a utility that detects and protects a personal computer from unauthorized intrusions. a. firewall c. threat neutralizer b. antihacker d. protection utility ANS: A
PTS: 1
REF: 287
24. The accompanying figure lists a few of the utilities available in Windows 7; one of the utilities available in Windows 7, a(n) ____ utility, identifies computer problems but does not repair them. a. troubleshooting c. operational b. executional d. diagnostic ANS: D
PTS: 1
REF: 291
25. The accompanying figure lists a few of the utilities available in Windows 7; one of the utilities available in Windows 7, a file ____ utility, shrinks the size of a file. a. scanner c. defragmenter b. compression d. archiver ANS: B
PTS: 1
REF: 290
26. The accompanying figure lists a few of the utilities available in Windows 7; one of the utilities available in Windows 7, a personal computer ____ utility, identifies and fixes operating system problems, detects and repairs disk problems, and includes the capability of improving a computer’s performance. a. maintenance c. functional b. multitasking d. proprietary ANS: A
PTS: 1
REF: 291
27. Which of the following is NOT a type of operating system? a. wireless c. server b. stand-alone d. embedded ANS: A
PTS: 1
REF: 279
28. The first version of Windows was developed in the mid-____. a. 1960s c. 1980s b. 1970s d. 1990s ANS: C
PTS: 1
REF: 280
29. A ____ operating system is a complete operating system that works on a desktop computer, a notebook computer, or mobile computing device. a. multitasking c. single-user b. media-based d. stand-alone ANS: D
PTS: 1
REF: 280
30. Which of the following is NOT an edition of Windows 7? a. Enterprise c. Home Premium b. Ultimate d. Starter ANS: A
PTS: 1
REF: 280
31. Apple’s latest operating system version, Mac ____, is a multitasking operating system available only for computers manufactured by Apple. a. Safari c. OS X b. OS IX d. OS XI ANS: C
PTS: 1
32. To defragment a disk means to ____. a. slow it down b. diagnose problems with it ANS: C
PTS: 1
REF: 281
c. reorganize it d. repair it REF: 286
33. The term ____ describes a potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user’s knowledge or permission. a. firewall c. virus b. agent d. spyware ANS: C
PTS: 1
REF: 288
34. ____ is a program that displays an online advertisement in a banner or pop-up window on Web pages, e-mail, or other Internet services. a. Compression software c. Resident software b. Symbianware d. Adware ANS: D
PTS: 1
REF: 289
35. To ____ a file, you restore a zipped file to its original form. a. restore c. zip b. archive d. uncompress ANS: D
PTS: 1
REF: 290
36. A pop-up ____ is a filtering program that stops pop-up ads from displaying on Web pages. a. blocker c. stopper b. driver d. monitor ANS: A
PTS: 1
REF: 290
37. Compressed files sometimes are called ____ files. a. skipped c. zipped b. controlled d. defragmented ANS: C
PTS: 1
REF: 290
38. ____ is a popular stand-alone file compression utility. a. Smasher c. CompUtil b. PKZIP d. All of the above ANS: B
PTS: 1
REF: 290
39. ____ is a scam in which a perpetrator attempts to obtain your personal and/or financial information. a. Phishing c. Pharming b. Zipping d. Authenticating ANS: A
PTS: 1
REF: 290
40. A(n) ____ filter is a program that warns or blocks you from potentially fraudulent or suspicious Web sites. a. operating c. zipping b. phishing d. antispam ANS: B
PTS: 1
REF: 290
MULTIPLE RESPONSE Modified Multiple Choice 1. System software serves as the interface between the ____. a. server c. user b. application software d. computer’s hardware ANS: B, C, D
PTS: 1
REF: 270
2. Command-line interfaces are hard to use because they require exact ____. a. diction c. spelling b. grammar d. punctuation ANS: B, C, D
PTS: 1
REF: 273
3. ____ allow hundreds to thousands of users to connect at the same time, and thus are multiuser. a. Networks c. Servers
b. Mainframes ANS: A, B, C, D
d. Supercomputers PTS: 1
4. ____ is an embedded operating system. a. Solaris b. Google Android ANS: B, C, D
PTS: 1
REF: 275
c. Symbian OS d. Windows Phone 7 REF: 279
5. Disc burning software usually also includes ____ editing capabilities. a. photo c. video b. Web site d. audio ANS: A, C, D
PTS: 1
REF: 291
MODIFIED TRUE/FALSE 1. The kernel is memory resident, which means it remains on the hard disk while the computer is running. _________________________ ANS: F, in memory PTS: 1
REF: 272
2. When you purchase application software, the package identifies the required platform. _________________________ ANS: T
PTS: 1
REF: 272
3. When you install new software, often an on-screen prompt instructs you to restart the computer, in which case a cold boot is appropriate. _________________________ ANS: F, warm PTS: 1
REF: 272
4. Symbian OS is an example of a(n) network operating system. _________________________ ANS: F, embedded PTS: 1
REF: 283
5. A(n) Internet spy removes or blocks certain items from being displayed. _________________________ ANS: F, filter PTS: 1
REF: 289
TRUE/FALSE 1. On mobile devices, the operating system may reside on a RAM chip.
ANS: F
PTS: 1
REF: 271
2. The boot process is similar for large and small computers. ANS: T
PTS: 1
REF: 272
3. In a multitasking environment, many programs run in the foreground, while one program remains in the background. ANS: F
PTS: 1
REF: 274
4. One drawback of multiprocessing is that it tends to reduce a computer’s processing speed. ANS: F
PTS: 1
REF: 275
5. Because virtual memory is faster than RAM, users may notice the computer speeding up while it uses virtual memory. ANS: F
PTS: 1
REF: 275
6. Multiuser operating systems always process jobs on a first-come, first-served basis. ANS: F
PTS: 1
REF: 275
7. While waiting for devices to become idle, the operating system places items in buffers. ANS: T
PTS: 1
REF: 275
8. If a printer does not have its own internal memory or if its memory is full, the operating system’s buffer holds the information waiting to print while the printer prints from the buffer at its own rate of speed. ANS: T
PTS: 1
REF: 275
9. Virtual memory is faster than RAM. ANS: F
PTS: 1
REF: 275
10. The operating system determines the order in which tasks are processed. ANS: T
PTS: 1
REF: 275
11. If you attach a new device to a computer, its driver must be installed before you can use the device. ANS: T
PTS: 1
REF: 276
12. A network administrator is a program that monitors network performance. ANS: F
PTS: 1
REF: 278
13. Encryption is the process of encoding data and information into an unreadable form. ANS: T
PTS: 1
REF: 278
14. Windows 7 is available in several editions, which are grouped in two general categories: Embedded and Personal. ANS: F
PTS: 1
REF: 280
15. Linux is an example of proprietary software, which means that its code is available to the public. ANS: F
PTS: 1
REF: 282
16. Windows Embedded CE is designed for use on computing devices with limited functionality. ANS: T
PTS: 1
REF: 283
17. Palm OS is an example of a stand-alone operating system. ANS: F
PTS: 1
REF: 283
18. Utility programs, like those shown in the accompanying figure, are considered to be application software. ANS: F
PTS: 1
REF: 284
19. The accompanying figure lists a few of the utilities available in Windows 7; one of the utilities available in Windows 7, a disk scanner, is a utility that removes a program from system files. ANS: F
PTS: 1
REF: 285
20. Fragmentation slows down disk access and the performance of the entire computer. ANS: T
PTS: 1
REF: 286
21. Some operating systems include a built-in firewall to protect the computer from unauthorized intrusions. ANS: T
PTS: 1
REF: 287
22. Screen savers originally were developed to prevent a problem called etching, in which images could be permanently etched on a monitor’s screen. ANS: F
PTS: 1
REF: 287
23. Most antivirus programs also protect against worms and Trojan horses. ANS: T
PTS: 1
REF: 288
24. An anti-spam program restricts access to certain material on the Web. ANS: F
PTS: 1
REF: 289
25. Uncompressing a file is the same as zipping a file. ANS: F
PTS: 1
REF: 290
COMPLETION 1. The operating system typically resides on the computer’s ____________________. ANS: hard disk PTS: 1
REF: 271
2. The operating system a computer uses sometimes is called the ____________________. ANS: platform PTS: 1
REF: 272
3. When turning on a computer that has been powered off completely, you are performing a(n) ____________________. ANS: cold boot PTS: 1
REF: 272
4. ____________________ is the process of starting or restarting a computer. ANS: Booting PTS: 1
REF: 272
5. With a(n) ____________________, you interact with menus and visual images such as buttons and other graphical objects to issue commands. ANS: GUI graphical user interface PTS: 1
REF: 273
6. ____________________ memory is a concept in which the operating system allocates a portion of a storage medium to function as additional RAM. ANS: Virtual PTS: 1
REF: 275
7. The operating system technique of swapping items between memory and storage is called ____________________. ANS: paging PTS: 1
REF: 275
8. When an operating system spends much of its time paging, instead of executing application software, it is said to be ____________________. ANS: thrashing PTS: 1
REF: 275
9. A(n) ____________________ is a segment of memory or storage in which items are placed while waiting to be transferred from an input device or to an output device. ANS: buffer PTS: 1
REF: 275
10. To protect sensitive data and information as it travels over a network, an operating system often ____________________ it. ANS: encrypts PTS: 1
REF: 278
11. New versions of an operating system usually are ____________________ compatible. ANS: backward PTS: 1
REF: 279
12. Windows ____________________ is Microsoft’s fastest, most efficient operating system to date, offering quicker application startup, built-in diagnostics, automatic recovery, improved security, and enhanced searching and organizing capabilities.
ANS: 7 PTS: 1
REF: 280
13. Linux is ____________________ software, which means its code is available to the public for use, modification, and redistribution. ANS: open source PTS: 1
REF: 282
14. Novell’s NetWare is a(n) ____________________ operating system. ANS: server PTS: 1
REF: 283
15. UNIX and Linux often are called ____________________ operating systems because they are both stand-alone and server operating systems. ANS: multipurpose PTS: 1
REF: 283
16. The operating system on most PDAs and small devices, called a(n) ____________________ operating system, resides on a ROM chip. ANS: embedded PTS: 1
REF: 283
17. A(n) ____________________ like the one in the accompanying figure is a type of system software that allows a user to perform maintenance-type tasks, usually related to managing a computer, its devices, or its programs. ANS: utility PTS: 1
REF: 284
18. A(n) ____________________ copies itself repeatedly in memory or over a network, using up system resources and possibly shutting the system down. ANS: worm PTS: 1 REF: 288 19. A(n) ____________________ hides within or looks like a legitimate program such as a screen saver. ANS: Trojan horse PTS: 1
REF: 288
20. ____________________ is a program placed on a computer without the user’s knowledge that secretly collects information about the user. ANS: Spyware